CN107623554A - A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network - Google Patents

A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network Download PDF

Info

Publication number
CN107623554A
CN107623554A CN201710735383.0A CN201710735383A CN107623554A CN 107623554 A CN107623554 A CN 107623554A CN 201710735383 A CN201710735383 A CN 201710735383A CN 107623554 A CN107623554 A CN 107623554A
Authority
CN
China
Prior art keywords
fusion center
user
secondary user
frequency spectrum
trust value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710735383.0A
Other languages
Chinese (zh)
Other versions
CN107623554B (en
Inventor
裴庆祺
谷雨
马立川
李子
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XI'AN LIANKE INFORMATION Tech CO Ltd
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201710735383.0A priority Critical patent/CN107623554B/en
Publication of CN107623554A publication Critical patent/CN107623554A/en
Application granted granted Critical
Publication of CN107623554B publication Critical patent/CN107623554B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention belongs to wireless device, network communication technology field, discloses a kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network, and key step includes:Each secondary user's and fusion center perceive ambient parameter in network;Fusion center calculates average signal-to-noise ratio, false-alarm probability, path loss, detection probability, bit average signal-to-noise ratio, a bit error probability, reports correct sensing results probability;Select trust value thresholding and time window;Secondary user's report sensing results;Calculate secondary user's trust value;Trust value judges;Judge the number of elements difference that the number of elements for participating in the secondary user's set of frequency spectrum perception is gathered with honest user;Frequency spectrum perception result judgement is carried out, obtains court verdict.The present invention can detect the various attacks that malicious user starts in the case of non-ideal CCCH, and have good robustness when attacker's quantity is more, ensure that the accuracy of frequency spectrum perception data.

Description

A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network
Technical field
The invention belongs to wireless device, network communication technology field, more particularly to a kind of collaboration frequency spectrum based on trust value Cognitive method, cognition wireless network.
Background technology
The large-scale application of wireless device and wireless network makes limited frequency spectrum resource growing tension, and static spectral distributes There is the problem of frequency spectrum resource utilization rate is low in scheme, the proposition of cognitive radio technology is exactly to alleviate frequency spectrum resource utilization rate Contradiction between low and frequency spectrum resource is short.Cognition wireless network allows unauthorized user to find to be not used by frequency spectrum perception Idle grants frequency spectrum, wait for an opportunity frequency spectrum access to improve the utilization rate of frequency spectrum resource.Frequency spectrum perception is that unauthorized user enters Line frequency spectrum accesses a critical step, and perception data is reported fusion center by unauthorized user, and fusion center is to channel perception No occupancy makes final judgement.In order to solve unique user due to perceiving knot caused by the reasons such as multipath fading and concealed terminal Fruit inaccuracy problem, collaborative spectrum sensing have obtained extensive research.Perception is improved by the collaborative sensing of multiple users The degree of accuracy, but can introduce the attacker of malice in collaborative spectrum sensing process.Current most of researchs use faith mechanism, lead to The credit value of more new node is crossed to reject malicious user, but most Research Hypothesis unauthorized user reports sense to fusion center The CCCH of primary data be it is preferable, i.e., will not be because of the shadow of noise, barrier etc. in perception data transmitting procedure Ring and malfunction.The hypothesis of this preferable CCCH has certain reasonability, but in the environment of practical application, due to prominent Send out noise and build the influence of species barrier, the perception information error-prone of transmission;If not considering error issues, will make Obtain the degree of accuracy of fusion center judgement and the verification and measurement ratio of malicious user is influenceed by serious.Therefore, deposited in CCCH In the case of mistake, how to ensure that the robustness of attacker's detection scheme and the degree of accuracy of fusion center judgement are a urgent needs Solve the problems, such as.For center type cognition wireless network during collaborative spectrum sensing, the secondary user's of each unauthorized will be local Frequency spectrum perception result fusion center is reported by CCCH, fusion center is by integration program to each secondary user's Perception data is merged, and obtains final court verdict to determine to authorize whether frequency range takes;In cognition wireless network except Resource utilization problem, security are the premises of its network operation.Safety problem can directly affect the standard of frequency spectrum perception Exactness, during frequency spectrum perception, frequency spectrum perception data tampering attack (SSDF:Spectrum Sensing Data Falsification) it is one of attack form for having a great influence at present.A kind of Zhejiang University's patented technology " cognitive radio system Cooperation frequency spectrum sensing method in system " (application number:200810163516.2 Authorization Notice No.:CN 101459445B) disclosed in A kind of frequency spectrum sensing method cooperated in cognitive radio system.The patented technology comprises the concrete steps that:It is each use first Family carries out energy measuring to primary user's signal, and energy measuring sensing results are sent into control centre;From User reliability data The confidence level of each user is read in storehouse, is normalized to obtain weight system of each user in this cooperative sensing Number;Local sensing results are mutually multiplied accumulating afterwards compared with the decision threshold of system with the weight coefficient of corresponding user, if greater than Then target frequency bands are currently being used by primary user;Used if less than then target frequency bands currently without by primary user.The patent Technology can detect the attacker of malice to a certain extent, reduce influence of the malicious user to system, but existing deficiency It is:First, during frequency spectrum perception result is sent to control centre by perception user, not accounting for perception data can be public The problem of being made a mistake during control channel transmission, and in the physical environment of reality, wireless signal is in transmission During, reason is blocked etc. due to burst noise, the interference of other wireless signals and barrier, it is easy to make a mistake;Secondly, Final judging result is together decided on by perception data and weight, and this just produces attacker when sending malicious data, due to number According to difference it is entirely possible cause whole court verdict mistake the problem of.Hyder C S et al. are in its paper " ARC:Adaptive reputation based clustering against spectrum sensing data falsification attacks”([J].《IEEE Transactions on mobile computing》,2014,13(8):In 1707-1719) Propose it is a kind of malicious user is detected based on the clustering algorithm of credit value, the algorithm does not need the priori of attacker's distribution Attack detecting is can be carried out, SSDF some attacks can be resisted to a certain extent.Deficiency is existing for this method:It is first First, the algorithm is not accounted for because secondary user's by CCCH report perception number during credit value updates According to when may mistake situation, " 0 " that local primary user is not present especially is obtained using the method for hard decision in secondary user's " 1 " court verdict existing for primary user, and " 0 ", " 1 " court verdict are sent to fusion center by public control channel During, because environment burst noise, barrier such as block at the interference of factor, it is likely that so that " 0 ", " 1 " result are sent out completely Raw reversion, this will increase the probability of false detection and false-alarm probability of system, more in the scene of non-ideal control channel to its algorithm In the case of the individual non-conspiracy attack of attacker, after attacker's quantity exceedes the 30% of system user sum, probability of false detection reaches To 0.2 or so, false-alarm probability reaches 0.15 or so, and this will have a strong impact on the accuracy of perception data judgement;Secondly, for attacking The problem of attack pattern for the person of hitting does not account for conspiracy attack, the algorithm proposed to it are non-ideal public in attacker's conspiracy attack In the case of control channel, after attacker's quantity exceedes the 30% of system user sum.Its correct judgement probability only has 0.6 left side The right side, and correctly adjudicate probability with the increase of attacker's quantity and start drastically to decline.Court verdict mistake is so may result in, The normal frequency range of resultant interference primary user uses or wasted available frequency spectrum resource.
In summary, the problem of prior art is present be:Existing frequency spectrum sensing method, which exists, does not account for perception data The problem of being made a mistake during CCCH transmits, data difference is entirely possible to cause whole court verdict The problem of mistake;Do not account for due to when secondary user's report perception data by CCCH may mistake feelings Condition, increase the probability of false detection and false-alarm probability of system, have a strong impact on the accuracy of perception data judgement, cause court verdict Mistake.
The content of the invention
The problem of existing for prior art, the invention provides a kind of cooperative frequency spectrum sensing method based on trust value, Cognition wireless network.
The present invention is achieved in that a kind of cooperative frequency spectrum sensing method based on trust value, described based on trust value Cooperative frequency spectrum sensing method includes:After network startup, each secondary user's and fusion center perceive ambient parameter in network, to system Required each parameter is initialized;Fusion center calculate average signal-to-noise ratio, false-alarm probability, path loss parameter, detection probability, Bit average signal-to-noise ratio, a bit error probability, report the probability of correct sensing results;Fusion center determines that time window is big It is small, select trust value thresholding;Fusion center seclected time window and trust thresholding;Secondary user's report frequency spectrum sense to fusion center Know result;Calculate the trust value of each secondary user's;The trust value of each secondary user's is judged compared with trusting thresholding; Judge the difference for the number of elements that the quantity for participating in the element of the secondary user's set of collaborative spectrum sensing is gathered with honest user; Fusion center carries out frequency spectrum perception result judgement, obtains final court verdict.
Further, the cooperative frequency spectrum sensing method based on trust value comprises the following steps:
Step 1, each secondary user's and fusion center perceive to following ambient parameter in network:Authorized master user PU Transmission power ρPU, secondary user's SUiTransmission power ρi, primary user PU and secondary user's SUiThe distance between dp, secondary use Family SUiThe distance between fusion center di, path loss constant κ, path loss index μ, energy measuring thresholding λ and Gauss make an uproar The variances sigma of sound2;Wherein i=1,2 ..., N, N represent to participate in the secondary user's sum of collaborative spectrum sensing;Fusion center calculates flat Equal signal to noise ratioFalse-alarm probability Pf, path loss hPUWith detection probability Pd:Fusion center is respectively under preferable CCCH Secondary user's SUiReceive the average signal-to-noise ratio of primary user's PU signalsFalse-alarm probability Pf, primary user PU and secondary user's SUi Between path loss hPUWith detection probability PdCalculated;Fusion center calculates path loss hi, bit average signal-to-noise ratioWith One bit error probability Pe,i:Fusion center is respectively to fusion center under non-ideal CCCH and secondary user's SUiIt Between path loss hi, bit average signal-to-noise ratio between fusion center and secondary user's SUWith a bit error probability Pe,iEnter Row calculates;Fusion center is estimated to report the Probability p of correct sensing resultsHAnd PH,i:Fusion center is respectively to preferable common control channel Secondary user's under road report correct perception probability pHCorrect perception is reported with the secondary user's under non-ideal CCCH Probability PH,iEstimated;
Step 2, fusion center determine to calculate the time window T of secondary user's trust valuew;Fusion center is respectively each Secondary user's SUi(i=1,2 ..., N), select trust value thresholding ηi
Step 3, seclected time window TwWith trust thresholding ηi, initialize honest user's setSecondary user's are every Individual time window TwDuring beginning by Energy-aware method obtain perceive frequency range data, and by by the perception data of itself with Energy threshold λ compares carry out hard decision, obtains judgement " 0 ", " 1 " result of itself, and reports fusion center, and " 0 " represents to perceive Frequency range is idle, and " 1 " represents that perceive frequency range just uses in authorized user;In each time window TwAt the end of, used for secondary FamilyFusion center calculates its trust value ri;Fusion center is by each secondary user's SUiTrust value riWith trusting door Limit ηiIt is compared, if ri< ηi, then user SU is perceivediFor malicious attacker, and update honest user's set"/" represents that user SU will be perceivediGather from honest userMiddle rejecting;Judge to participate in cooperation The secondary user's set of frequency spectrum perceptionElement quantityGather with honest userNumber of elementsDifference Value:If fusion center judgesSet up, then carry out in next step, otherwise network operator terminates the network operation, and Each cognitive nodes are investigated, wherein Δ represents difference threshold;Fusion center is in next time window TwAccording to secondary The sensing results of reporting of user carry out data fusion with the credit value of the user with most methods of weighting, obtain final result S.
Further, fusion center calculates average signal-to-noise ratioFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween Path loss hPUWith detection probability PdMethod be:
Wherein w represents time-bandwidth product, and Γ () represents gamma function, and Γ () represents incomplete gamma functions.
Further, fusion center calculates path loss hi, bit average signal-to-noise ratioWith a bit error probability Pe,i's Method is:
Further, fusion center estimation reports the Probability p of correct sensing resultsHAnd PH,iMethod be:
pH=PBPd+PI(1-Pf);
Wherein PBWhat is represented is that primary user PU is authorizing the probability of band transmissions signal, PIRepresent that primary user PU is not being authorized The probability of band transmissions signal, PI=1-PB
Further, fusion center determines time window TwThe method of size is:
Further, fusion center selection trust value thresholding ηiRefer to ηiMeet:
Wherein erfc (x) is complementary error function,∈ represents the bit error rate.
Further, fusion center calculates each secondary user's SUiTrust value riMethod be:
Wherein τiRepresent in time window TwInterior secondary user's SUiReport frequency spectrum perception result and fusion center conclusive judgement Consistent number.
Further, fusion center carries out frequency spectrum perception result judgement, and obtaining final result S method is:
Wherein ldiRepresent secondary user's SUiLocal frequency spectrum perception court verdict, ldi∈{0,1};If S < 0, are merged The court verdict at center is " 1 ", i.e., channel perception takes;Otherwise court verdict is " 0 ", and channel perception is idle.
Another object of the present invention is to provide a kind of recognizing for the cooperative frequency spectrum sensing method based on trust value described in application Know wireless network.
Advantages of the present invention and good effect are:According to the position where each users at different levels, and combine channel fading feelings Condition, trust value is independently distributed for each user, overcome the deficiency that global user initializes same trust value.Can be non-ideal CCCH attacker quantity carried out less than the total number of users half of system in the case of conspiracy attack with close to 1.0 Detection probability detects attacker, and previously mentioned Hyder C S et al. detection scheme in this case detect to attack The probability for the person of hitting only has 0.6 or so, the effective accuracy for ensureing fusion center final judging result, avoids the wave of available frequency band Take, prevent the interference to authorized master user proper communication.The present invention can under the scene of non-ideal CCCH basis The trust value of secondary user's judges whether it is malicious user, rejects the perception data of mistake, makes cognition wireless network frequency spectrum sense The data known are more accurately and reliably.
The present invention is during secondary user's report perception data to fusion center, it is contemplated that data are in transmission Error problem, overcome and assume that control CCCH is ideal communication channel in the prior art, do not consider in actual data transfer During error problem;And in terms of malicious attacker challenge model, it is contemplated that multiple in practical application scene attack The Hybrid Attack of the non-conspiracy attack of the person of hitting, conspiracy attack and conspiracy and non-conspiracy, can be attacked in non-ideal CCCH In the case that person starts various attack patterns, the mistaken verdict probability of system is reduced to 0.02 or so, and it is previously mentioned The mistaken verdict probability of Hyder C S et al. scheme in this case is overcome in the prior art to public 0.1 or so The preferable deficiency with the single hypothesis of attacker's attack pattern of control channel so that the present invention improves practicality.
Brief description of the drawings
Fig. 1 is the cooperative frequency spectrum sensing method flow chart provided in an embodiment of the present invention based on trust value.
Fig. 2 is the application scenarios schematic diagram of the cooperative frequency spectrum sensing method provided in an embodiment of the present invention based on trust value.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
The present invention can detect the various attacks that malicious user starts in the case of nonideal CCCH, and And there is good robustness when attacker's quantity is more, it ensure that the accuracy of frequency spectrum perception data.
The application principle of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in figure 1, the cooperative frequency spectrum sensing method provided in an embodiment of the present invention based on trust value comprises the following steps:
S101:Each secondary user's and fusion center carry out perception ambient parameter to ambient parameter in network;Fusion center meter Calculation average signal-to-noise ratio, false-alarm probability, path loss parameter, detection probability, bit average signal-to-noise ratio, a bit error probability, Report the probability of correct sensing results;
S102:Fusion center determines time window size;Select trust value thresholding;
S103:Seclected time window and trust thresholding;Secondary user's report frequency spectrum perception result to fusion center;Calculate every The trust value of individual secondary user's;The trust value of each secondary user's is judged compared with trusting thresholding;Judge to participate in cooperation The difference of the quantity of the element of the secondary user's set of frequency spectrum perception and the number of elements of honest user set;Fusion center is carried out Frequency spectrum perception result judgement, obtain final court verdict.
The application principle of the present invention is further described below in conjunction with the accompanying drawings.
As shown in Fig. 2 formula cognition wireless network centered on the application scenarios of the present invention, time user is in samely in network Manage in primary user's PU signal cover in position, while honest secondary user's SU and malice secondary user's MSU be present Collaborative spectrum sensing is carried out, secondary user's perceive frequency range using the method for Energy-aware, in local compared with noise gate Court verdict is reported into fusion center FC afterwards, occupancy of the fusion center FC according to the court verdict of each reporting of user to channel perception Situation makes final judgement.
Cooperative frequency spectrum sensing method provided in an embodiment of the present invention based on trust value comprises the following steps:
First, system initialization:
Step 1.1:Perceive ambient parameter:
Each secondary user's and fusion center perceive to following ambient parameter in network:Authorized master user PU transmitting work( Rate ρPU, secondary user's SUiTransmission power ρi, primary user PU and secondary user's SUiThe distance between dp, secondary user's SUiWith melting The distance between conjunction center di, path loss constant κ, path loss index μ, the variance of energy measuring thresholding λ and Gaussian noise σ2;Wherein i=1,2 ..., N, N represent to participate in the secondary user's sum of collaborative spectrum sensing;
Step 1.2:Fusion center calculates average signal-to-noise ratioFalse-alarm probability Pf, path loss hPUWith detection probability Pd
Based on the parameter having determined, fusion center is respectively to the secondary user's SU under preferable CCCHiReceive To the average signal-to-noise ratio of primary user's PU signalsFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween path loss hPU With detection probability PdCalculated, computational methods are as follows:
Wherein w represents time-bandwidth product, and Γ () represents gamma function, and Γ () represents incomplete gamma functions, other Meaning of parameters is identical with 1.1;
Step 1.3:Fusion center calculates path loss hi, bit average signal-to-noise ratioWith a bit error probability Pe,i
By 1.1 and 1.2 parameters determined, fusion center is respectively to fusion center and secondary under non-ideal CCCH User SUiBetween path loss hi, bit average signal-to-noise ratio between fusion center and secondary user's SUWith a bit-errors Probability Pe,iCalculated, computational methods are as follows:
Step 1.4:Fusion center is estimated to report the Probability p of correct sensing resultsHAnd PH,i
By parameter that is given and having calculated, fusion center is respectively in the secondary user's under preferable CCCH Report correct perception probability pHCorrect perception probability P is reported with the secondary user's under non-ideal CCCHH,iEstimated, Method of estimation is as follows:
pH=PBPd+PI(1-Pf);
Wherein PBWhat is represented is that primary user PU is authorizing the probability of band transmissions signal, PIRepresent that primary user PU is not being authorized The probability of band transmissions signal, i.e. PI=1-PB
2nd, trust value thresholding is selected
Step 2.1:Determine time window size:
Fusion center determines to calculate the time window T of secondary user's trust valuew, its determination method is as follows:
Step 2.2:Select trust value thresholding:
Fusion center is respectively each secondary user's SUi(i=1,2 ..., N), select trust value thresholding ηi, its system of selection It is as follows:
Wherein erfc (x) is complementary error function,∈ represents the bit error rate.
3rd, collaborative spectrum sensing and malicious attacker detect
Step 3.1:Seclected time window TwWith trust thresholding ηi, initialize honest user's set
Fusion center in two, selection trust value thresholding step by obtaining time window TwWith trust thresholding ηiValue, and just The honest user's set of beginningizationRepresent the secondary user's set of participation collaborative spectrum sensing;
Step 3.2:Secondary user's report frequency spectrum perception result to fusion center:
Secondary user's are in each time window TwObtain perceiving the data of frequency range during beginning by Energy-aware method, and lead to The carry out hard decision compared with energy threshold λ is crossed the perception data of itself, obtains judgement " 0 ", " 1 " result of itself, and report Fusion center, " 0 " represent that perception frequency range is idle, and " 1 " represents that perceive frequency range just uses in authorized user;
Step 3.3:Calculate each secondary user's SUiTrust value ri
In each time window TwAt the end of, for secondary user'sFusion center calculates its trust value ri, its Computational methods are as follows:
Wherein τiRepresent in time window TwInterior secondary user's SUiReport frequency spectrum perception result and fusion center conclusive judgement Consistent number.
Step 3.4:To each secondary user's SUiTrust value riJudged:
Fusion center is by each secondary user's SUiTrust value riWith trusting thresholding ηiIt is compared, if ri< ηi, then perceive User SUiFor malicious attacker, and update honest user's set"/" represents that user will be perceived SUiGather from honest userMiddle rejecting;
Step:3.5 judge to participate in the secondary user's set of collaborative spectrum sensingElement quantityUsed with honesty Gather at familyNumber of elementsDifference;
If fusion center judgesSet up, then go to 3.6, otherwise network operator terminates the network operation, And each cognitive nodes are investigated, wherein Δ represents difference threshold;
Step:3.6 fusion centers carry out frequency spectrum perception result judgement, obtain final court verdict S:
Fusion center is in next time window TwAccording to the sensing results that secondary user's report and the credit value of the user Data fusion is carried out with most methods of weighting, obtains final result S, and returns to 3.1 and carries out next round collaborative spectrum sensing, Final result S computational methods are as follows:
Wherein ldiRepresent secondary user's SUiLocal frequency spectrum perception court verdict, ldi∈{0,1};If S < 0, are merged The court verdict at center is " 1 ", i.e., channel perception takes;Otherwise court verdict is " 0 ", and channel perception is idle.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.

Claims (10)

  1. A kind of 1. cooperative frequency spectrum sensing method based on trust value, it is characterised in that the collaboration frequency spectrum sense based on trust value Perception method includes:After network startup, each secondary user's and fusion center perceive ambient parameter in network, to each ginseng needed for system Number is initialized;Fusion center, which calculates average signal-to-noise ratio, false-alarm probability, path loss parameter, detection probability, bit, averagely to be believed Make an uproar ratio, a bit error probability, report the probability of correct sensing results;Fusion center determines time window size, selection letter Appoint value thresholding;Fusion center seclected time window and trust thresholding;Secondary user's report frequency spectrum perception result to fusion center;Meter Calculate the trust value of each secondary user's;The trust value of each secondary user's is judged compared with trusting thresholding;Judge to participate in The difference of the quantity of the element of the secondary user's set of collaborative spectrum sensing and the number of elements of honest user set;Fusion center Frequency spectrum perception result judgement is carried out, obtains final court verdict.
  2. 2. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 1, it is characterised in that described to be based on trust value Cooperative frequency spectrum sensing method comprise the following steps:
    Step 1, each secondary user's and fusion center perceive to following ambient parameter in network:Authorized master user PU hair Penetrate power ρPU, secondary user's SUiTransmission power ρi, primary user PU and secondary user's SUiThe distance between dp, secondary user's SUi The distance between fusion center di, path loss constant κ, path loss index μ, energy measuring thresholding λ and Gaussian noise Variances sigma2;Wherein i=1,2 ..., N, N represent to participate in the secondary user's sum of collaborative spectrum sensing;Fusion center calculates average letter Make an uproar ratioFalse-alarm probability Pf, path loss hPUWith detection probability Pd:Fusion center is respectively to time under preferable CCCH Level user SUiReceive the average signal-to-noise ratio of primary user's PU signalsFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween Path loss hPUWith detection probability PdCalculated;Fusion center calculates path loss hi, bit average signal-to-noise ratioWith one Bit error probability Pe,i:Fusion center is respectively to fusion center under non-ideal CCCH and secondary user's SUiBetween road H is lost in footpathi, bit average signal-to-noise ratio between fusion center and secondary user's SUWith a bit error probability Pe,iCounted Calculate;Fusion center is estimated to report the Probability p of correct sensing resultsHAnd PH,i:Fusion center is respectively under preferable CCCH Secondary user's report correct perception probability pHCorrect perception probability is reported with the secondary user's under non-ideal CCCH PH,iEstimated;
    Step 2, fusion center determine to calculate the time window T of secondary user's trust valuew;Fusion center is respectively each secondary use Family SUi(i=1,2 ..., N), select trust value thresholding ηi
    Step 3, seclected time window TwWith trust thresholding ηi, initialize honest user's setSecondary user's are in each time Window TwObtain perceiving the data of frequency range during beginning by Energy-aware method, and by by the perception data of itself and energy door Limit λ compares carry out hard decision, obtains judgement " 0 ", " 1 " result of itself, and reports fusion center, and " 0 " represents to perceive frequency range sky Spare time, " 1 " represent that perceive frequency range just uses in authorized user;In each time window TwAt the end of, for secondary user'sFusion center calculates its trust value ri;Fusion center is by each secondary user's SUiTrust value riWith trusting thresholding ηiIt is compared, if ri< ηi, then user SU is perceivediFor malicious attacker, and update honest user's set "/" represents that user SU will be perceivediGather from honest userMiddle rejecting;Judge to participate in collaboration frequency spectrum sense The secondary user's set knownNumber of elementsGather with honest userNumber of elementsDifference:In fusion If the heart judgesSet up, then carry out in next step, otherwise network operator terminates the network operation, and recognizes each Know that node is investigated, wherein Δ represents difference threshold;Fusion center is in next time window TwReported according to secondary user's The credit value of sensing results and the user carry out data fusion with most methods of weighting, obtain final result S.
  3. 3. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center calculates flat Equal signal to noise ratioFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween path loss hPUWith detection probability PdRefer to:
    Wherein w represents time-bandwidth product, and Γ () represents gamma function, and Γ () represents incomplete gamma functions.
  4. 4. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center calculates road H is lost in footpathi, bit average signal-to-noise ratioWith a bit error probability Pe,iRefer to:
  5. 5. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that in fusion center estimation Report the Probability p of correct sensing resultsHAnd PH,iRefer to:
    pH=PBPd+PI(1-Pf);
    Wherein PBWhat is represented is that primary user PU is authorizing the probability of band transmissions signal, PIRepresent that primary user PU is not authorizing frequency range The probability of transmission signal, PI=1-PB
  6. 6. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that when fusion center determines Between window TwSize refers to:
  7. 7. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center selection letter Appoint value thresholding ηiRefer to ηiMeet:
    Wherein erfc (x) is complementary error function,∈ represents the bit error rate.
  8. 8. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center calculates every Individual secondary user's SUiTrust value riRefer to:
    Wherein τiRepresent in time window TwInterior secondary user's SUiReport frequency spectrum perception result consistent with fusion center conclusive judgement Number.
  9. 9. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center enters line frequency Compose sensing results to judge, obtain final result S and refer to:
    Wherein ldiRepresent secondary user's SUiLocal frequency spectrum perception court verdict, ldi∈{0,1};If S < 0, fusion center Court verdict be " 1 ", i.e., channel perception take;Otherwise court verdict is " 0 ", and channel perception is idle.
  10. A kind of 10. cognition wireless using the cooperative frequency spectrum sensing method based on trust value described in claim 1~9 any one Network.
CN201710735383.0A 2017-08-24 2017-08-24 Cooperation spectrum sensing method based on trust value and cognitive wireless network Active CN107623554B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710735383.0A CN107623554B (en) 2017-08-24 2017-08-24 Cooperation spectrum sensing method based on trust value and cognitive wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710735383.0A CN107623554B (en) 2017-08-24 2017-08-24 Cooperation spectrum sensing method based on trust value and cognitive wireless network

Publications (2)

Publication Number Publication Date
CN107623554A true CN107623554A (en) 2018-01-23
CN107623554B CN107623554B (en) 2021-02-02

Family

ID=61088247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710735383.0A Active CN107623554B (en) 2017-08-24 2017-08-24 Cooperation spectrum sensing method based on trust value and cognitive wireless network

Country Status (1)

Country Link
CN (1) CN107623554B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035429A (en) * 2019-04-09 2019-07-19 重庆邮电大学 WiFi and anti-interference minimal redundancy method under ZigBee coexistance model
CN110337106A (en) * 2019-07-10 2019-10-15 广东工业大学 A kind of cooperative frequency spectrum sensing method, the apparatus and system of anti-SSDF attack
CN111106888A (en) * 2019-12-10 2020-05-05 重庆邮电大学 Multi-mode correlation based step-by-step spectrum sensing method and storage medium
CN111770499A (en) * 2020-06-24 2020-10-13 电子科技大学 Distributed spectrum cooperation detection method
CN113347638A (en) * 2021-05-14 2021-09-03 东北大学 Dynamic cooperative spectrum prediction and sensing method for cognitive industry Internet of things
CN113472463A (en) * 2021-06-30 2021-10-01 中国人民解放军国防科技大学 Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network
CN113765607A (en) * 2021-03-15 2021-12-07 全球能源互联网研究院有限公司 Frequency spectrum detection method and device
CN114189299A (en) * 2021-11-08 2022-03-15 西安电子科技大学广州研究院 Rapid consensus method and system capable of defending against spectrum sensing data forgery attacks
CN114614923A (en) * 2022-02-25 2022-06-10 中国人民解放军陆军工程大学 Spectrum use order strengthening method and system based on abnormal frequency behavior detection
CN113347638B (en) * 2021-05-14 2024-04-30 东北大学 Cognitive industrial Internet of things dynamic cooperation spectrum prediction and perception method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413474A (en) * 2012-01-04 2012-04-11 西安电子科技大学 Self-adaption trust management system and method of cognitive radio network
CN103731834A (en) * 2014-01-02 2014-04-16 重庆邮电大学 Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network
CN103957062A (en) * 2014-03-31 2014-07-30 西安电子科技大学 Method for evaluating reputation of cognitive users in distributed cognitive radio network
CN104065430A (en) * 2014-07-09 2014-09-24 南通大学 Method for cooperative spectrum detection based on node recognition
CN105227253A (en) * 2015-08-20 2016-01-06 黑龙江科技大学 A kind of novel double threshold collaborative spectrum sensing algorithm based on energy measuring
CN105490761A (en) * 2015-11-25 2016-04-13 宁波大学 A vehicle network cognitive radio adaptive spectrum sensing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413474A (en) * 2012-01-04 2012-04-11 西安电子科技大学 Self-adaption trust management system and method of cognitive radio network
CN103731834A (en) * 2014-01-02 2014-04-16 重庆邮电大学 Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network
CN103957062A (en) * 2014-03-31 2014-07-30 西安电子科技大学 Method for evaluating reputation of cognitive users in distributed cognitive radio network
CN104065430A (en) * 2014-07-09 2014-09-24 南通大学 Method for cooperative spectrum detection based on node recognition
CN105227253A (en) * 2015-08-20 2016-01-06 黑龙江科技大学 A kind of novel double threshold collaborative spectrum sensing algorithm based on energy measuring
CN105490761A (en) * 2015-11-25 2016-04-13 宁波大学 A vehicle network cognitive radio adaptive spectrum sensing method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李红宁等: "《认知无线网络中收敛感知算法安全性检测》", 《西安电子科技大学学报》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035429A (en) * 2019-04-09 2019-07-19 重庆邮电大学 WiFi and anti-interference minimal redundancy method under ZigBee coexistance model
CN110035429B (en) * 2019-04-09 2021-11-09 重庆邮电大学 Anti-interference minimum redundancy method in WiFi and ZigBee coexistence mode
CN110337106A (en) * 2019-07-10 2019-10-15 广东工业大学 A kind of cooperative frequency spectrum sensing method, the apparatus and system of anti-SSDF attack
CN111106888B (en) * 2019-12-10 2022-03-22 重庆邮电大学 Multi-mode correlation based step-by-step spectrum sensing method and storage medium
CN111106888A (en) * 2019-12-10 2020-05-05 重庆邮电大学 Multi-mode correlation based step-by-step spectrum sensing method and storage medium
CN111770499A (en) * 2020-06-24 2020-10-13 电子科技大学 Distributed spectrum cooperation detection method
CN111770499B (en) * 2020-06-24 2022-04-26 电子科技大学 Distributed spectrum cooperation detection method
CN113765607B (en) * 2021-03-15 2022-08-30 全球能源互联网研究院有限公司 Frequency spectrum detection method and device
CN113765607A (en) * 2021-03-15 2021-12-07 全球能源互联网研究院有限公司 Frequency spectrum detection method and device
CN113347638A (en) * 2021-05-14 2021-09-03 东北大学 Dynamic cooperative spectrum prediction and sensing method for cognitive industry Internet of things
CN113347638B (en) * 2021-05-14 2024-04-30 东北大学 Cognitive industrial Internet of things dynamic cooperation spectrum prediction and perception method
CN113472463A (en) * 2021-06-30 2021-10-01 中国人民解放军国防科技大学 Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network
CN113472463B (en) * 2021-06-30 2023-06-16 中国人民解放军国防科技大学 Detection method for secondary user violating interference constraint behavior in cognitive wireless network
CN114189299A (en) * 2021-11-08 2022-03-15 西安电子科技大学广州研究院 Rapid consensus method and system capable of defending against spectrum sensing data forgery attacks
CN114614923A (en) * 2022-02-25 2022-06-10 中国人民解放军陆军工程大学 Spectrum use order strengthening method and system based on abnormal frequency behavior detection
CN114614923B (en) * 2022-02-25 2023-08-29 中国人民解放军陆军工程大学 Spectrum use order strengthening method and system based on abnormal frequency behavior detection

Also Published As

Publication number Publication date
CN107623554B (en) 2021-02-02

Similar Documents

Publication Publication Date Title
CN107623554A (en) A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network
Spuhler et al. Detection of reactive jamming in DSSS-based wireless communications
CN102724678B (en) Reputation-based resource allocation method in central-type cognition wireless network
CN103117820B (en) Based on the weighting cooperative spectrum detection method of confidence level
CN104618908B (en) The method and apparatus that distributed cognition wireless network is attacked anti-distort perception data
CN103873171B (en) Based on the collaborative spectrum sensing Decision fusion method that multi-user cooperates mutually
CN103929259B (en) A kind of many bit decision cooperation adaptive spectrum cognitive methods based on degree of belief in cognitive ofdm system
CN104780006A (en) Frequency spectrum detector soft fusion method based on minimum error probability rule
CN106603500B (en) Frequency spectrum perception data detection method in cognition wireless network based on relationship match
CN107370521A (en) A kind of cognitive radio multi-user Cooperation frequency spectrum sensing method
CN108038419A (en) Wi-Fi-based indoor personnel passive detection method
CN103780317A (en) Double-threshold collaborative frequency spectrum perception method based on trust degree
CN109168166A (en) The safety detecting method of physical layer Verification System
CN103841566B (en) Method for cooperative spectrum sensing based on D-S evidence theory under condition of malicious user attacks in mobile model
Wang et al. Detection of collaborative SSDF attacks using abnormality detection algorithm in cognitive radio networks
Zhang et al. Cooperative spectrum sensing based on artificial neural network for cognitive radio systems
Liu Mac spoofing attack detection based on physical layer characteristics in wireless networks
CN103731834A (en) Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network
CN108449151B (en) Spectrum access method in cognitive radio network based on machine learning
CN102006609A (en) Adaptive sequential cooperative spectrum detection method
CN106850583A (en) A kind of distributed collaborative frequency spectrum perception attack defense method based on effectiveness
CN104079359A (en) Cooperative spectrum sensing threshold optimization method in cognitive wireless network
CN103780323B (en) A kind of cognitive radio wideband frequency spectrum cognitive method based on signal polymerization property
CN109150623B (en) Method for resisting SSDF attack of malicious user based on round robin reputation value
Yan et al. Signal strength based wireless location verification under spatially correlated shadowing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210607

Address after: No.10702, building 1, Qing'an Park, No.9, Gaoxin 2nd Road, high tech Zone, Xi'an City, Shaanxi Province, 710000

Patentee after: Xi'an Lianke Information Technology Co.,Ltd.

Address before: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an

Patentee before: XIDIAN University